You are on page 1of 24

A Seminar Report

on

iTWIN TECHNOLOGY
Submitted in partial fulfillment of the requirements for the award of the Degree of

BACHELOR OF TECHNOLOGY

In
COMPUTER SCIENCE AND ENGINEERING

by
U.SUMAN SRI LAKSHMI

(16FE1A05F0)
Under the guidance of

Dr. S .V. S . Santhi

Associate Professor

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


VIGNAN’S LARA INSTITUTE OF TECHNOLOGY AND SCIENCE
(Affiliated to Jawaharlal Nehru Technological University Kakinada , Kakinada) (An ISO
9001:2015 Certified Institution, Approved by AICTE) Vadlamudi , Guntur Dist, Andhra
Pradesh-522213 April - 2020.
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
VIGNAN’S LARA INSTITUTE OF TECHNOLOGY AND SCIENCE
(Affiliated to Jawaharlal Nehru Technological University Kakinada, Kakinada)

(An ISO 9001:2015 Certified Institution, Approved by AICTE)

Vadlamudi-522213

CERTIFICATE
This is to certify that the seminar report entitled “iTWIN TECHNOLOGY” is a bonafide work
done by U. SUMANA SRI LAKSHMI (16FE1A05F0) submitted in fulfillment of the
requirements for the award of the degree of Bachelor of Technology in COMPUTER
SCIENCE AND ENGINEERING from JAWAHARLAL NEHRU TECHNOLOGICAL
UNIVERSITY, KAKINADA. The work embodied in this seminar report is not submitted to
any University or Institution for the award of any Degree or diploma.

Seminar Coordinator(s) Head of the Department

Dr . S . V.S. SANTHI Mr. T.V VAMSI KRISHNA M.Tech, (Ph.D)

Ms. K . SUSHMA Assistant Professor

Mrs . LALITHA VANI SRI


ACKNOWLEDGEMENT

The satisfaction that accompanies with the successful completion of any task would be
incomplete without the mention of people whose ceaseless cooperation made it possible, whose
constant guidance and encouragement crown all efforts with success.

I am grateful to Ms. M. GARGI, Mr. S. DEVA KUMAR, Ms. K. DEEPIKA, Department of


Computer Science and Engineering for guiding through this seminar and for encouraging right
from the beginning of the seminar till successful completion of the seminar. Every interaction
with them was an inspiration.

I thank Mr. T. V. VAMSI KRISHNA, Assistant Professor& HOD, Department of Computer


Science and Engineering for support and valuable suggestions.

I also express my thanks to Dr. K. PHANEENDRA KUMAR, Principal, Vignan’s Lara


Institute of Technology & Science for providing the resources to carry out the seminar.

I also express my sincere thanks to our beloved Chairman Dr. LAVU RATHAIAH for
providing support and stimulating environment for developing the seminar report.

I also place my floral gratitude to all other teaching and lab technicians for their constant support
and advice throughout the seminar.

U . Sumana Sri Lakshmi(16FE1A05F0)


DECLARATION

I hereby declare that the project report entitled “iTWIN TECHNOLOGY” is a record of an
original work done by me under the guidance of Dr. S .V .S . Santhi , Associate
Professor of Computer Science and Engineering and this seminar report is submitted in the
fulfillment of the requirements for the award of the Degree of Bachelor of Technology in
Computer Science and Engineering. The results embodied in this seminar report are not
submitted to any other University or Institute for the award of any Degree or Diploma.

Place : Vadlamudi

Date : (Signature)
ABSTRACT

iTwin is a 'limitless' secure USB device that enables users to access, edit & share all
their files & media between any two online computers anywhere in the world. The only limit is
the size of your computer’s hard drive. iTwin is an innovative solution that allows remote file
access without the security and privacy risks of the cloud and USB flash drives. It’s very easy to
access as a USB device and no special installation is required. iTwin uses thoroughly analyzed
crypto protocols and algorithms (AES 256 bit encryption). It has features like bi-directional file
access, no temp files, remote disable, smart key generation, password support and twintrust
authentication.

i
CONTENTS

CHAPTER TITLE PAGE NO

1. Introduction to iTwin 01

2. Need of iTwin 02
2.1 Differences between iTwin and Cloud Storage
2.2 iTwin vs Flash drive

3. How to use iTwin 04

4. Unique features of iTwin 05

5. Uses of iTwin 07
5.1 Remotely edit files
5.2 Like a limitless capacity secure USB files
5.3 iTwin for muti collaboration
6. Security provided by iTwin 09
6.1 What is Malware
6.2 Effects of Malware
6.3 Protection from Malware
6.4 Twin Trust Authentication
6.5 Twin Factor Authentication
7. Environment Required for iTwin technology 12

8. Algorithm used by iTwin 13


9. Conclusion 16
10. References 17

ii
LIST OF FIGURES

Fig. No. Figure Page No.

1 How iTwin look like 01

2 How to use iTwin 04

3 Features of iTwin 06

4 Remotely edit files using iTwin 07

5 Like a limitless capacity secure USB files 07

6 iTwin for multi collaboration 08

7 Various Malware 09

8 Spyware 10

9 Trojan Horse 10

10 AES Algorithm process 13

11 Encryption process of AES 13

iii
CHAPTER 1
INTRODUCTION

iTwin is like the two ends of a cable , without the cable . iTwin is a revolutionary
new file sharing and remote access device brought to you by a company called iTwin . It's like
two ends of a cable , without the cable . It's as simple to use as a flash drive . It's literally plug
and play.

iTwin can connect any two online computers anywhere in the world . iTwin enables
you to have access to any or all of your home computer's files and folders while you're on-the-
go you can also use iTwin to access to any or all of your office computer's files and folders
There's no in-built limit to the amount of storage you can access with iTwin .

iTwin is a 'limitless' secure USB device that enables users to access, edit & share
all their files & media between any two online computers anywhere in the world. The only
limit is the size of your computer’s hard drive.

Fig no-1: How iTwin look like

1
CHAPTER 2

NEED OF iTWIN

Transferring data from one PC to another can be difficult, especially if it's a large
amount of data. For example, if you want to send some data to somebody in another country,
you’re going to have to go through the hassle of either sending it via e-mail, or upload it to
some file hosting service. Chances are, if your file is too large, you’ll probably need to buy
more storage.
Enter iTwi, This new USB dongle/USB drive allows users to remotely access data
from anywhere in the world. It’s a one time investment

2.1 Differences between iTWIN and Cloud Storage :

2.1.1 What is Cloud Storage?

Cloud storage is a cloud computing model that stores data on the Internet
through a cloud computing provider who manages and operates data storage as a
service. It’s delivered on demand with just-in-time capacity and costs, and eliminates
buying and managing your own data storage infrastructure. This gives you agility,
global scale and durability, with “anytime, anywhere” data access .

2.1.2 How does Cloud Storage work:

Cloud storage is purchased from a third party cloud vendor who owns and
operates data storage capacity and delivers it over the Internet in a pay-as-you-go
model. These cloud storage vendors manage capacity, security and durability to
make data accessible to your applications all around the world.

Applications access cloud storage through traditional storage protocols or


directly via an API. Many vendors offer complementary services designed to help
collect, manage, secure and analyze data at massive scale.

2.1.3 Benefits of Cloud Storage:

 Total Cost of Ownership

 Time to Deployment

 Information Management

2
iTWIN vs Cloud Storage :

Property iTwin Cloud Storage

Plug 'n' play no configurations no Need to download software


Ease of Installation setups needed install & configure it

First few GB's free then for


Storage limit and Files reside on your own computer excess you have to pay
monthly fees so no storage limit monthly fees

Hardware based security in


Degree of security addition to password Password only

2.2 iTWIN vs Flash Drives :


A USB flash drive is a data storage device that consists of flash memory with an
integrated Universal Serial Bus (USB) interface. But a drawback of this USB flash drives is
it’s small size cause of which it can easily be misplaced or lost. This is a particular problem if
the data it contains is sensitive and confidential.

The following table shows the differences between iTWIN and Flash Drives

Property iTwin Flash Drive

Access to computer's entire hard 2GB to 256 GB (depending


Capacity drive & any attached storage. on model)

If you lose one half, you can


remotely disable it. Your data If you lose the device, you
remains safe as nothing is stored on lose and expose your data.
Remote disable the device itself.

Standard USB devices don't


support encryption. Need
Data Encryption AES 256-bit additional software

3
CHAPTER 3

HOW TO USE iTWIN

The Following Demonstrate how to use iTWIN ,

Fig no – 2: How to use iTWIN

4
CHAPTER 4

UNIQUE FEATURES OF iTWIN

 Smart key generation:


Two iTwins together generate a random 256-bit AES key, everytime they are
physically paired and plugged into a computer. Smart Key generation is assisted by the
computer to add randomness. Smart crypto key resides only on the two halves of the
paired iTwin. Smart Crypto key is used for encrypting all data traffic between two
iTwins.
 No “Temp Files”:
Unplug iTwin and all temp files are purged automatically. This is especially useful when
using a computer that does not belong to you.

 Password support:

iTwin even provides password support. Passwords of any length can be set. Unlike other
web services, iTwin's password is stored on itself, not on any server. If you forget your
password, simply pair both halves of your iTwin, plug them into a computer and set a new
password. No need for tech support!

 Bi – Directional File Access :

When using iTwin, the connection between the 2 computers is completely symmetrical.
Access, copy, backup & remotely edit files on computer A from computer B, and on B
from A. You will have access to files on both A and B.

 iTwin is like the two ends of a cable , without the cable:

iTwin is just like a wireless device connecting two systems and securely transferring data
between them.

 Some more extra features are showed in the below diagram,

 Multi-language support
 No storage limitations

5
Fig no – 3: Features of iTwin

 Completely symmetrical, first of its kind in the market.


 During physical pairing, connector is used to securely transfer crypto key between
the 2 halves of iTwin.

6
CHAPTER 5

USES OF iTwin

5.1 Remotely edits files


Remotely edits the shares files from any location.iTwin allows you to keep a single version
one computer with you and your chosen iTwin partner collaborating directly on tho
version.Say goodbye to multiple versions of files flying around by email.Say goodbye to the
headaches of needless re-work.Say hello to iTwin.

Fig no - 4: Remotely edit files using iTwin

5.2 Like a limitless capacity secure USB files

Fig no -5 : Like a limitless capacity secure USB files

7
Directly share the files between two Share the files through the cloud storage by
Computers without using a cloud. securing the files with in iTwin secure box.

5.3 Itwin for multi collaboration

 You can plug in multiple iTwin devices into a single computer and use your computer
as centralized shared storage place for the files shared in group of people.

 You can update the files in storage place and the whole group will have to access to
latest set of files.

Fig no – 6 : iTwin for multi collaboration

8
CHAPTER 6

SECURITY PROVIDED BY iTWIN

iTwin doesn't store any data on itself. It just enables a secure connection between
two computers. Your remote data can only be accessed if you have the physical iTwin with
you. Additionally, you can set up your iTwin to require a password. iTwin is a secure USB
device providing Two-Factor Authentication (hardware device + password).We also allow
you to remotely disable iTwin with our remote disable feature. So you can rest assured that
your data is safe, even if you lose your iTwin device.

6.1 What is Malware:

Malware, short for malicious software, consists of programming (code, scripts, active content,
and other software). It is designed to disrupt or deny operation, gather information that leads
to loss of privacy or exploitation, or gain unauthorized access to system resources, or that
otherwise exhibits abusive behavior. Malware is disguised as genuine software, and may
come from an official site. Therefore, some security programs, such as McAfee may call
malware "potentially unwanted programs" or "PUP".

Fig no -7 : Various Malware

6.2 Effects of Malware :

Spyware is a piece of software that collects and sends information (such as browsing patterns
in the more benign case or credit card numbers in more serious ones) on users. They usually
work and spread like Trojan horses. The category of spyware is sometimes taken to include

9
adware of the less-forthcoming sort. Trojan horses are similar to viruses in that they get
executed by being part of an otherwise useful piece of software.To spread, Trojan horses rely
on the useful features of the host software, which trick users to install them.
Spyware :
Spyware is unwanted software that infiltrates your computing device, stealing your internet
usage data and sensitive information. Spyware is classified as a type of malware — malicious
software designed to gain access to or damage your computer, often without your knowledge.
Spyware gathers your personal information and relays it to advertisers, data firms, or external
users.

Fig no - 8 : Spyware

Trojan horse:
A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but
can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in
general inflict some other harmful action on your data or network.

Fig no - 9: Trojan Horse


10
6.3 Protection from Malware

iTwin does not facilitate malware distribution. Malware spreads through regular USB
drives, when a malicious program executes and writes itself to the USB drive automatically
(without your permission or without you even realizing it). When the infected USB drive is
plugged into another computer, the software may be able to automatically run. There are two
necessary conditions for malware spread.
1) Infected File should be copied to a new computer.
2) Infected File should executed on the new computer.
With iTwin, you explicitly select the files that needs to be copied. And the iTwin device does
not store any unauthorized files on itself - it only stores iTwin application files. Malicious
files cannot trick iTwin into copying files automatically. However, if you use iTwin (or any
file transfer system) to knowingly copy suspicious files on to your computer and you execute
them (by clicking on them) you might be opening malware.

6.4 Twin Trust Authentication :

 Before allowing any data transfer, every iTwin is authenticated by iTwin's TwinTrust
servers.
 All communication between iTwin and TwinTrust is secured using industry strength
HTTPS (RSA 1024 bit, 128 bit RC4) protocol.
 After successful authentication by TwinTrust, TwinTrust assist iTwin to discover its
other half.

6.5 Two Factor Authentication :

 After authenticating with TwinTrust, two halves of iTwin mutually authenticate each
other using their pre-shared AES 256 bit crypto key.
 If password is set, then password verification is performed on both iTwins before data
transfer is initiated between two iTwins .

11
CHAPTER 7

ENVIRONMENT REQUIRED FOR iTWIN TECHNOLOGY

Here we will see both Software and Hardware requirements

Software Requirements:
 When you plug iTwin into a computer for the first time iTwin software gets
installed in the computer.
 Requires 15MB hard-disk space.
 USB 2.0 port
 Requires a broad-band internet access 1Mbps upload speed recommended.
 Automatic updates.

Hardware Requirements:
 Length: 3.54 inches (90 mm).
 Width: 0.82 inch (21 mm).
 Depth: 0.314 inch (8.0 mm).
 Weight: 0.11 pound (50g).

Operating Requirements:
 Operating temperature: 32° to 158° F (0° to 70° C).
 Relative humidity: 5% to 95% non-condensing.
 Maximum operating altitude: 10,000 feet (3000 m).

Special things in iTwin:


 LED Indicator
 LED lights indicate status.
 Constant Blue light: iTwin is fully functional.
 Blinking Blue light: on-going data transfer.
 Constant red light: error.

12
CHAPTER 8
ALGORITHM USED BY iTWIN
The algorithm used by iTwin is Advanced Encryption Standard 256 bit
crypto algorithm . Let’s take a look at AES 256 bit crypto algorithm.
Advannced Encryption Standard 256 bit crypto algorithm:
AES is an iterative rather than Feistel cipher. It is based on ‘substitution–
permutation network’. It comprises of a series of linked operations, some of which
involve replacing inputs by specific outputs (substitutions) and others involve
shuffling bits around (permutations). AES uses 10 rounds for 128-bit keys, 12
rounds for 192-bit keys and 14 rounds for 256-bit keys. Each of these rounds uses a
different 128-bit round key, which is calculated from the original AES key.

Fig no - 10 : AES Algorithm process

Encryption Process:
Here, we restrict to description of a typical round of AES encryption. Each round
comprise of four sub-processes. The first round process is depicted below –

Fig no - 11: Encryption Process of AES

13
Byte Substitution (SubBytes):

The 16 input bytes are substituted by looking up a fixed table (S-box) given in design.
The result is in a matrix of four rows and four columns.

Shiftrows:

Each of the four rows of the matrix is shifted to the left. Any entries that ‘fall off’ are re-
inserted on the right side of row. Shift is carried out as follows −

 First row is not shifted.

 Second row is shifted one (byte) position to the left.

 Third row is shifted two positions to the left.

 Fourth row is shifted three positions to the left.

 The result is a new matrix consisting of the same 16 bytes but shifted with respect
to each other.

MixColumns:

Each column of four bytes is now transformed using a special mathematical function.
This function takes as input the four bytes of one column and outputs four completely
new bytes, which replace the original column. The result is another new matrix
consisting of 16 new bytes. It should be noted that this step is not performed in the last
round.

Addroundkey:

The 16 bytes of the matrix are now considered as 128 bits and are XORed to the 128 bits
of the round key. If this is the last round then the output is the ciphertext. Otherwise, the
resulting 128 bits are interpreted as 16 bytes and we begin another similar round.

Decryption Process:

The process of decryption of an AES ciphertext is similar to the encryption process in


the reverse order. Each round consists of the four processes conducted in the reverse
order −

14
 Add round key
 Mix columns
 Shift rows
 Byte substitution

Since sub-processes in each round are in reverse manner, unlike for a Feistel Cipher, the
encryption and decryption algorithms needs to be separately implemented, although they
are very closely related.

AES features:

The selection process for the new symmetric key algorithm was fully open to public
scrutiny and comment; this ensured a thorough, transparent analysis of the designs
submitted.

NIST specified the new Advanced Encryption Standard algorithm must be a block cipher
capable of handling 128-bit blocks, using keys sized at 128, 192, and 256 bits; other
criteria for being chosen as the next Advanced Encryption Standard algorithm included:

 Security: Competing algorithms were to be judged on their ability to resist attack, as


compared to other submitted ciphers, though security strength was to be considered
the most important factor in the competition.

 Cost: Intended to be released on a global, nonexclusive and royalty-free basis, the


candidate algorithms were to be evaluated on computational and memory efficiency.

 Implementation: Factors to be considered included the algorithm's flexibility,


suitability for hardware or software implementation and overall simplicity.

15
CHAPTER 9
CONCLUSION

iTwin - A fantastic solution for the home users who want to access and change
their files remotely and securely. The iTwin is simple & inexpensively solves
the limitations. For those who want to keep files up to date between two
computers iTwin is for you. It has a few drawbacks like A Bit expensive, Ends
are not protected by caps and Not compatible with Linux.

16
CHAPTER 10
REFERENCES

 https://www.itwin.com

 https://www.tekgoblin.com/2012/02/05/itwin-review/#ixzz1lqklcjMy

 https://twitter.com

17

You might also like